From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
Notations | Descriptions |
---|---|
\(U_{i}\) | ith user |
\(USC\) | The user’s smart card |
\(S_{j}\) | jth sensor node |
\(GWN\) | Gateway node |
\(S_{g}\) | Secret key of the gateway node |
\(PK_{g}\) | Public key of the gateway node |
\(GWNPS_{j}\) | Secret key of the gateway node shared with the sensor node |
\(GWNPU_{i}\) | Secret key of the gateway node shared with the user |
\(UID_{i}\) | User’s identity |
\(UPWD_{i}\) | User’s password |
\(SID_{j}\) | Sensor node's identity |
\(BIO_{i}\) | User’s biological information |
\(T_{x}\) | Current timestamp |
\(\Delta T\) | Allowed transmission delay |
\(SK\) | Shared session key |
\(E_{x} ()/D_{x} ()\) | Encryption or decryption function using x |
\(h()\) | One-way hash function |
\(BH()\) | Bio-hash operation |
\(\oplus\) | Performing XOR operation |
|| | Concatenation operation |